On May 25, 2018, the General Data Protection Regulation (GDPR) came into force, after it was adopted by the European Union. For two years companies have been flooded with offers for GDPR solutions from security firms; and publications have been bombarded with surveys claiming that only certain percentage of firms are ready for it or...

Over 100 million Internet-of-Things (IoT) devices from thousands of vendors are vulnerable to a downgrade attack that permits the hackers to attain unauthorized access to your devices. This issue which was discovered by a team of researchers lies in the implementation of Z-Wave protocol. This protocol which is primarily used for home automation devices is...

Last week an Alexa-enabled Echo device recorded and shared a private conversation of its owners without their knowledge. This news has created an alert among the public on the voice assistant privacy issues. On Thursday, news came out that a Portland family’s Echo device had recorded a conversation of them without them knowing and had...

Over the past 9 years, Google Chrome has become one of the best and most popular web browsers in the world. The major reason for its swift rise has been Google’s focus on security. Currently, protecting Chrome users from malware is the topmost priority. Chrome can protect you from ransomware, hijackers and other unpleasant extends...

Apple is going to allow all of its users to download their data which the company have collected about them so far. On Wednesday, Apple launched a new Data and Privacy website that permits you to download every details which the company knows about you, including the user’s Apple ID info, device info, App Store...

The Cisco security team have unearthed more than 500,000 routers and storage devices in numerous countries that have been infected with a piece of highly sophisticated IoT botnet malware. According to the findings these are likely the work of some state-sponsored group. Talos, the cyber intelligence unit of Cisco have found an advanced piece of...

The security researchers from a Chinese firm Tencent have found more than a dozen vulnerabilities in the compute units of BMW cars. A few of these vulnerabilities can be exploited to endanger a vehicle. These faults have been discovered after a year long security audit of their cybersecurity research unit, Keen Security Lab. The same...

The first network-based remote Rowhammer attack, known as Throwhammer, involves exploiting a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels. Now a group of researchers have revealed a second network-based remote Rowhammer technique which can attack systems using uncached memory or flush instruction while processing the network requests. It...

Just after the revelation of the two critical vulnerabilities in GPON router, at least 5 botnet families are found exploiting the flaws to build an army of million devices. Security researchers from Chinese-based cybersecurity firm Qihoo 360 Netlab have found 5 botnet families, including Mettle, Muhstik, Mirai, Hajime, and Satori, using the GPON exploit. Gigabit-capable...

Users who have recently installed the security updates on Windows 10 workstations are finding that they have received an error when trying to establish a remote desktop connection to a server which had worked properly before installing the updates. The initial March 13, 2018, release updates the CredSSP authentication protocol and the Remote Desktop clients...